Chapter 24 acl configuration -4 – PLANET WGSW-50040 User Manual
Page 8

6
............................................................................................. 23-1
................................................................................. 23-1
..........................................................................24-4
24.1.3 Access-list Action and Global Default Action
....................................................................... 24-4
CHAPTER 25 802.1X CONFIGURATION
......................................................................25-1
25.1.1 The Authentication Structure of 802.1x
............................................................................... 25-1
25.1.2 The Work Mechanism of 802.1x
......................................................................................... 25-3
25.1.3 The Encapsulation of EAPOL Messages
............................................................................ 25-3
25.1.4 The Encapsulation of EAP Attributes
.................................................................................. 25-5
25.1.5 Web Authentication Proxy based on 802.1x
....................................................................... 25-5
25.1.6 The Authentication Methods of 802.1x
................................................................................ 25-6
25.1.7 The Extension and Optimization of 802.1x
....................................................................... 25-11
25.1.8 The Features of VLAN Allocation
...................................................................................... 25-12
25.3.1 Examples of Guest Vlan Applications
............................................................................... 25-16
25.3.2 Examples of IPv4 Radius Applications
.............................................................................. 25-19
25.3.3 Examples of IPv6 Radius Application
............................................................................... 25-20
25.3.4 802.1x Web Proxy Authentication Sample Application
..................................................... 25-21
CHAPTER 26 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN
CONFIGURATION
............................... 26-1
............................ 26-3
CHAPTER 27 OPERATIONAL CONFIGURATION OF AM FUNCTION
....................................................................................... 27-1